Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

blog.trailofbits.com

Trail of Bits Blog

Get the latest updates from Trail of Bits Blog directly as they happen.

Follow now 628 followers

Latest posts

Last updated 3 days ago

How MCP servers can steal your conversation history

3 days ago

This post explains how malicious MCP servers can exploit the Model Context...

Jumping the line: How MCP servers can attack you before you ever use them

5 days ago

This post is about a critical vulnerability in the Model Context Protocol...

Kicking off AIxCC’s Finals with Buttercup

5 days ago

Trail of Bits’ Cyber Reasoning System “Buttercup” is competing in DARPA’s AI...

Sneak peek: A new ASN.1 API for Python

8 days ago

We’re working on integrating an ASN.1 API into PyCA Cryptography built on...

Mitigating ELUSIVE COMET threats: Protecting against Zoom remote control attacks

10 days ago

This post describes a sophisticated social engineering campaign using Zoom’s remote control...

Neutralizing ELUSIVE COMET Zoom Remote Control Attacks

10 days ago

This post describes a sophisticated social engineering campaign using Zoom’s remote control...

Mitigating ELUSIVE COMET Zoom remote control attacks

10 days ago

This post describes a sophisticated social engineering campaign using Zoom’s remote control...

Introducing a new section on snapshot fuzzing for kernel-level testing in the Testing Handbook

17 days ago

Snapshot Fuzzing enables security engineers to effectively test software that is traditionally...

Benchmarking OpenSearch and Elasticsearch

about 2 months ago

This post concludes a four-month performance study of OpenSearch and Elasticsearch search...

Continuous TRAIL

about 2 months ago

You and your team should incrementally update your threat model as your...

Threat modeling the TRAIL of Bits way

about 2 months ago

In this blog, we’ll talk about our threat modeling process, TRAIL, which...

How Threat Modeling Could Have Prevented the $1.5B Bybit Hack

2 months ago

In this blog, we’ll talk about one of our most popular, but...